General

  • Target

    6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

  • Size

    17.5MB

  • Sample

    231223-xdxajsfec7

  • MD5

    087f6135bb6879ae18b40f72cdb66de8

  • SHA1

    79943d56d978fce7f26800c74117e7725160322d

  • SHA256

    6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

  • SHA512

    d73ec3a3054fca6e90a49b3a58756975eb973856e80b3d0d57e1ada5bbce7c3e46e3f9aca98b497d84339ddfefb07ca37da296a40d0f74555d3ffa495c3bf60a

  • SSDEEP

    393216:cCZp4RzJXMfn+T5vsXy4k7HvfBoN2Nmk0FQyPqc66J9:FkR1XQWhKy4k7yNAhi66J9

Score
8/10

Malware Config

Targets

    • Target

      6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

    • Size

      17.5MB

    • MD5

      087f6135bb6879ae18b40f72cdb66de8

    • SHA1

      79943d56d978fce7f26800c74117e7725160322d

    • SHA256

      6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

    • SHA512

      d73ec3a3054fca6e90a49b3a58756975eb973856e80b3d0d57e1ada5bbce7c3e46e3f9aca98b497d84339ddfefb07ca37da296a40d0f74555d3ffa495c3bf60a

    • SSDEEP

      393216:cCZp4RzJXMfn+T5vsXy4k7HvfBoN2Nmk0FQyPqc66J9:FkR1XQWhKy4k7yNAhi66J9

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks